diff --git a/user.js b/user.js index 82c7e6a..6d429fd 100644 --- a/user.js +++ b/user.js @@ -626,15 +626,8 @@ user_pref("browser.shell.shortcutFavicons", false); user_pref("alerts.showFavicons", false); // [DEFAULT: false] /*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS) - Note that your cipher and other settings can be used server side as a fingerprint attack - vector, see [1] (It's quite technical but the first part is easy to understand - and you can stop reading when you reach the second section titled "Enter Bro") - - Option 1: Use defaults for ciphers (1260's). There is nothing *weak* about these, but - due to breakage, browsers can't deprecate them until the web stops using them - Option 2: Disable the ciphers in 1261, 1262 and 1263. These shouldn't break anything. - Optionally, disable the ciphers in 1264. - + Your cipher and other settings can be used in server side fingerprinting + [TEST] https://www.ssllabs.com/ssltest/viewMyClient.html [1] https://www.securityartwork.es/2017/02/02/tls-client-fingerprinting-with-bro/ ***/ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!"); @@ -728,7 +721,7 @@ user_pref("security.mixed_content.block_display_content", true); * [1] https://bugzilla.mozilla.org/1190623 ***/ user_pref("security.mixed_content.block_object_subrequest", true); -/** CIPHERS [see the section 1200 intro] ***/ +/** CIPHERS [WARNING: do not meddle with your cipher suite: see the section 1200 intro] ***/ /* 1261: disable 3DES (effective key size < 128) * [1] https://en.wikipedia.org/wiki/3des#Security * [2] https://en.wikipedia.org/wiki/Meet-in-the-middle_attack